This rule is a stub.
Noncompliant Code Example
This noncompliant code example shows an example where ...
Compliant Solution
In this compliant solution, ...
Risk Assessment
Leaking sensitive information outside a trust boundary is not a good idea.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO30-PL | Low | Unlikely | Medium | P2 | L3 |
Related Guidelines
CERT Oracle Secure Coding Standard for Java | STR04-J. Use compatible character encodings when communicating string data between JVMs |